One of the most popular types of attacks on computer systems involves ___________.
These attacks deceive or use people to get around security controls. The best way to avoid this
risk is to ensure that employees know how to handle such attacks.
•
Question 7
For all the technical solutions you can devise to secure your systems, the
__________remains your greatest challenge.
•
Question 8
What term is used to describe a set of step-by-step actions to be performed to
accomplish a security requirement, process, or objective?
•
Question 9
Your organization’s __________ sets the tone for how you approach related activities.